Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
06-07-2022 22:26
Static task
static1
Behavioral task
behavioral1
Sample
098c9b9b367660132eec3df473f29d2f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
098c9b9b367660132eec3df473f29d2f.exe
Resource
win10v2004-20220414-en
General
-
Target
098c9b9b367660132eec3df473f29d2f.exe
-
Size
2.4MB
-
MD5
098c9b9b367660132eec3df473f29d2f
-
SHA1
132619d5e3f88b7d96c6b6ee0167a9907cf22abf
-
SHA256
4589222780e929e9d982ba839f37881d7861bcc07afb3c4e93acf0c20da8934e
-
SHA512
bdc1497e606c13802992742007ec209c257c7366ec3d702b8fdf38e2b7290e197804802689643afb0a39079fc642a9853dcab865dd88e4996ecce32a9a20857f
Malware Config
Extracted
redline
213.226.123.155:2014
-
auth_value
be2205f654abe3ef15343bc67642db4e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/215196-131-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
Installer.exepid process 215832 Installer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Installer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" Installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
098c9b9b367660132eec3df473f29d2f.exedescription pid process target process PID 4552 set thread context of 215196 4552 098c9b9b367660132eec3df473f29d2f.exe AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
AppLaunch.exeInstaller.exepowershell.exepid process 215196 AppLaunch.exe 215832 Installer.exe 216004 powershell.exe 216004 powershell.exe 215832 Installer.exe 215832 Installer.exe 215832 Installer.exe 215832 Installer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AppLaunch.exeInstaller.exepowershell.exedescription pid process Token: SeDebugPrivilege 215196 AppLaunch.exe Token: SeDebugPrivilege 215832 Installer.exe Token: SeDebugPrivilege 216004 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
098c9b9b367660132eec3df473f29d2f.exeAppLaunch.exeInstaller.execmd.execmd.exedescription pid process target process PID 4552 wrote to memory of 215196 4552 098c9b9b367660132eec3df473f29d2f.exe AppLaunch.exe PID 4552 wrote to memory of 215196 4552 098c9b9b367660132eec3df473f29d2f.exe AppLaunch.exe PID 4552 wrote to memory of 215196 4552 098c9b9b367660132eec3df473f29d2f.exe AppLaunch.exe PID 4552 wrote to memory of 215196 4552 098c9b9b367660132eec3df473f29d2f.exe AppLaunch.exe PID 4552 wrote to memory of 215196 4552 098c9b9b367660132eec3df473f29d2f.exe AppLaunch.exe PID 215196 wrote to memory of 215832 215196 AppLaunch.exe Installer.exe PID 215196 wrote to memory of 215832 215196 AppLaunch.exe Installer.exe PID 215196 wrote to memory of 215832 215196 AppLaunch.exe Installer.exe PID 215832 wrote to memory of 215952 215832 Installer.exe cmd.exe PID 215832 wrote to memory of 215952 215832 Installer.exe cmd.exe PID 215832 wrote to memory of 215952 215832 Installer.exe cmd.exe PID 215952 wrote to memory of 216004 215952 cmd.exe powershell.exe PID 215952 wrote to memory of 216004 215952 cmd.exe powershell.exe PID 215952 wrote to memory of 216004 215952 cmd.exe powershell.exe PID 215832 wrote to memory of 4760 215832 Installer.exe cmd.exe PID 215832 wrote to memory of 4760 215832 Installer.exe cmd.exe PID 215832 wrote to memory of 4760 215832 Installer.exe cmd.exe PID 215832 wrote to memory of 4192 215832 Installer.exe cmd.exe PID 215832 wrote to memory of 4192 215832 Installer.exe cmd.exe PID 215832 wrote to memory of 4192 215832 Installer.exe cmd.exe PID 4760 wrote to memory of 3456 4760 cmd.exe schtasks.exe PID 4760 wrote to memory of 3456 4760 cmd.exe schtasks.exe PID 4760 wrote to memory of 3456 4760 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\098c9b9b367660132eec3df473f29d2f.exe"C:\Users\Admin\AppData\Local\Temp\098c9b9b367660132eec3df473f29d2f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C powershell -EncodedCommand "PAAjAFUAMwBWAEcAMAAwAHkAYQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjADYAagB5ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAFMAbgBjAEIAbABLAFQAVABNACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjADcASAAjAD4A" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAFUAMwBWAEcAMAAwAHkAYQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjADYAagB5ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAFMAbgBjAEIAbABLAFQAVABNACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjADcASAAjAD4A"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk442" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Installer.exeFilesize
82KB
MD50759cd1397dbd963689019c7ef994df8
SHA1b9c0f77040e2ed3065329aa89f7420e68fef6194
SHA25642fbf11d75c5fa3895a269c62e0a23d8cc6856bef6a36c2dce81deac589b286a
SHA51210996b4f98af36456b9f41a488711854123b776d5b130f8db48d9589ea7e5cccde2d7f0eabaf00f7e201dbf52878dbc1c29242f9f35acb4e6f59b80862e83331
-
C:\Users\Admin\AppData\Local\Temp\Installer.exeFilesize
82KB
MD50759cd1397dbd963689019c7ef994df8
SHA1b9c0f77040e2ed3065329aa89f7420e68fef6194
SHA25642fbf11d75c5fa3895a269c62e0a23d8cc6856bef6a36c2dce81deac589b286a
SHA51210996b4f98af36456b9f41a488711854123b776d5b130f8db48d9589ea7e5cccde2d7f0eabaf00f7e201dbf52878dbc1c29242f9f35acb4e6f59b80862e83331
-
memory/3456-162-0x0000000000000000-mapping.dmp
-
memory/4192-161-0x0000000000000000-mapping.dmp
-
memory/4760-160-0x0000000000000000-mapping.dmp
-
memory/215196-143-0x00000000053C0000-0x00000000053DE000-memory.dmpFilesize
120KB
-
memory/215196-146-0x0000000007D50000-0x000000000827C000-memory.dmpFilesize
5.2MB
-
memory/215196-141-0x00000000052C0000-0x0000000005352000-memory.dmpFilesize
584KB
-
memory/215196-142-0x0000000005FE0000-0x0000000006584000-memory.dmpFilesize
5.6MB
-
memory/215196-130-0x0000000000000000-mapping.dmp
-
memory/215196-144-0x0000000005DF0000-0x0000000005E56000-memory.dmpFilesize
408KB
-
memory/215196-145-0x0000000007650000-0x0000000007812000-memory.dmpFilesize
1.8MB
-
memory/215196-131-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/215196-147-0x00000000068F0000-0x0000000006940000-memory.dmpFilesize
320KB
-
memory/215196-137-0x0000000004E30000-0x0000000004E42000-memory.dmpFilesize
72KB
-
memory/215196-139-0x0000000004E90000-0x0000000004ECC000-memory.dmpFilesize
240KB
-
memory/215196-138-0x0000000004F60000-0x000000000506A000-memory.dmpFilesize
1.0MB
-
memory/215196-140-0x0000000005240000-0x00000000052B6000-memory.dmpFilesize
472KB
-
memory/215196-136-0x0000000005410000-0x0000000005A28000-memory.dmpFilesize
6.1MB
-
memory/215832-148-0x0000000000000000-mapping.dmp
-
memory/215832-152-0x0000000005490000-0x000000000549A000-memory.dmpFilesize
40KB
-
memory/215832-151-0x0000000000AC0000-0x0000000000ADE000-memory.dmpFilesize
120KB
-
memory/215952-153-0x0000000000000000-mapping.dmp
-
memory/216004-156-0x0000000005180000-0x00000000057A8000-memory.dmpFilesize
6.2MB
-
memory/216004-158-0x0000000005980000-0x00000000059E6000-memory.dmpFilesize
408KB
-
memory/216004-159-0x0000000006080000-0x000000000609E000-memory.dmpFilesize
120KB
-
memory/216004-157-0x00000000058E0000-0x0000000005902000-memory.dmpFilesize
136KB
-
memory/216004-155-0x0000000002780000-0x00000000027B6000-memory.dmpFilesize
216KB
-
memory/216004-154-0x0000000000000000-mapping.dmp
-
memory/216004-163-0x0000000006640000-0x0000000006672000-memory.dmpFilesize
200KB
-
memory/216004-164-0x0000000070550000-0x000000007059C000-memory.dmpFilesize
304KB
-
memory/216004-165-0x0000000006620000-0x000000000663E000-memory.dmpFilesize
120KB
-
memory/216004-166-0x00000000079D0000-0x000000000804A000-memory.dmpFilesize
6.5MB
-
memory/216004-167-0x0000000007380000-0x000000000739A000-memory.dmpFilesize
104KB
-
memory/216004-168-0x0000000007410000-0x000000000741A000-memory.dmpFilesize
40KB
-
memory/216004-169-0x0000000007630000-0x00000000076C6000-memory.dmpFilesize
600KB
-
memory/216004-170-0x00000000075C0000-0x00000000075CE000-memory.dmpFilesize
56KB
-
memory/216004-171-0x00000000076D0000-0x00000000076EA000-memory.dmpFilesize
104KB
-
memory/216004-172-0x0000000007610000-0x0000000007618000-memory.dmpFilesize
32KB